29. ACSC 2006:
Hobart,
Tasmania,
Australia
Vladimir Estivill-Castro, Gillian Dobbie (Eds.):
Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19 2006.
CRPIT 48 Australian Computer Society 2006, ISBN 1-920682-30-9
- Chris R. Johnson, David M. Weinstein:
Biomedical computing and visualization.
3-10
- Greg Reeve, Steve Reeves:
Logic and refinement for charts.
13-23
- Min-Sheng Hsieh, Ewan D. Tempero:
Supporting software reuse by the individual programmer.
25-33
- Hayden Melton, Ewan D. Tempero:
Identifying refactoring opportunities by identifying dependency cycles.
35-41
- R. Ian Faulconbridge, Mark R. Pickering, Michael J. Ryan:
Unsupervised band removal leading to improved classification accuracy of hyperspectral images.
43-48
- Eric H. C. Choi:
On compensating the Mel-frequency cepstral coefficients for noisy speech recognition.
49-54
- Sergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy:
Segregated failures model for availability evaluation of fault-tolerant systems.
55-61
- Suan Khai Chong, Graham Farr, Laura Frost, Simon Hawley:
On pedagogically sound examples in public-key cryptography.
63-68
- Chuchang Liu, Mehmet A. Orgun:
Towards security labelling.
69-76
- Ken Tokoro, Kazuaki Yamaguchi, Sumio Masuda:
Improvements of TLAESA nearest neighbour search algorithm and extension to approximation search.
77-83
- Audun Jøsang, Ross Hayward, Simon Pope:
Trust network analysis with subjective logic.
85-94
- Bahadorreza Ofoghi, John Yearwood, Ranadhir Ghosh:
A semantic approach to boost passage retrieval effectiveness for question answering.
95-101
- Lloyd Allison:
A programming paradigm for machine learning, with a case study of Bayesian networks.
103-111
- Z. Zheng, G. Zhang, Q. He, J. Lu, Z. Shi:
Rule sets based bilevel decision model.
113-120
- Aniruddha Dasgupta, Aditya K. Ghose:
CASO: a framework for dealing with objectives in a constraint-based extension to AgentSpeak(L).
121-126
- S. Cikara, Stanislaw P. Maj, David T. Shaw:
Modelling layer 2 and layer 3 device bandwidths using B-node theory.
127-136
- Cruz Izu:
Throughput fairness in k-ary n-cube networks.
137-145
- Feng Lu, Kris Bubendorfer:
A JMX toolkit for merging network management systems.
147-156
- Hans-Jörg Schulz, Thomas Nocke, Heidrun Schumann:
A framework for visual data mining of structures.
157-166
- Alex Penev, Raymond K. Wong:
Shallow NLP techniques for internet search.
167-176
- Annika Hinze, Yann Michel, Torsten Schlieder:
Approximative filtering of XML documents in a publish/subscribe system.
177-185
- Anirban Majumdar, Clark D. Thomborson:
Manufacturing opaque predicates in distributed systems for code obfuscation.
187-196
- Sven Bittner, Annika Hinze:
Pruning subscriptions in distributed publish/subscribe systems.
197-206
- Annika Hinze, George Buchanan:
The challenge of creating cooperating mobile services: experiences and lessons learned.
207-215
- Yang-Wai Chow, Ronald Pose, Matthew Regan, James Phillips:
Human visual perception of region warping distortions.
217-226
- Scott Vallance, Paul R. Calder:
Rendering multi-perspective images with trilinear projection.
227-235
- Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham:
Extensible detection and indexing of highlight events in broadcasted sports video.
237-246
- Timothy J. Everts, Sung Sik Park, Byeong Ho Kang:
Using formal concept analysis with an incremental knowledge acquisition system for web document management.
247-256
- Annika Hinze, Petra Malik, Robi Malik:
Interaction design for a mobile context-aware system using discrete event modelling.
257-266
- Carl Cook, Neville Churcher:
Constructing real-time collaborative software engineering tools using CAISE, an architecture for supporting tool development.
267-276
- Christian Arwin, Seyed M. M. Tahaghoghi:
Plagiarism detection across programming languages.
277-286
- F. Y. Huang, C. B. Jay, David B. Skillicorn:
Programming with heterogeneous structures: manipulating XML data using bondi.
287-295
- Clara Murdaca, C. Barry Jay:
A relational account of objects.
297-302
- Colin J. Fidge, Tim McComb:
Tracing secure information flow through mode changes.
303-310
- Amit Vasudevan, Ramesh Yerraballi:
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation.
311-320
- Hua Wang, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson:
A framework for role-based group deligation in distributed environments.
321-328
Copyright © Mon Mar 15 03:06:29 2010
by Michael Ley (ley@uni-trier.de)